IPAddressa series ofnumbers thatidentifies anydevice on anetworkPrincipleof LeastPrivilegeusers andprograms shouldonly have thenecessary accessto complete theirtasksthink likeanadversarystrategy thatallows you toanticipate attackstrategies anddefend yoursystemsaccordinglyintegrityensures thatdata is notmodified ortamperedwithnon-repudiationprovidesvalidation ofa message'soriginexploita procedure orproduct that takesadvantage of avulnerability tocarry out a threatassetsomethingthat hasvalue to theperson ororganizationscriptkiddieunsophisticatedthreat actorsthat find andrun attacks theyfind online zerodayattack targeting asoftwarevulnerability whichis unknown to thesoftware vendor orto antivirus vendorsthreatanything thathas thepotential tocause the lossof an asset penetrationtestingattempt toevaluate thesecurity of an ITinfrastructure bysafely trying toexploitvulnerabilitiesMACAddressa hardwareidentificationnumber thatuniquely identifieseach device on anetworknation-stateextremelysophisticatedhacker that issponsored by oraffiliated with agovernmentalorganizationIoTnetwork ofphysical objectsembedded withsensors andsoftwareconnected to theInternetLinuxopen source andcommunity-developed operatingsystem forcomputers, servers,mainframes, mobiledevices andembedded devicesreconnaissancepractice ofcovertlydiscovering andcollectinginformationabout a systemenumerationprocess ofextracting usernames, machinenames, networkresources, sharesand services from asystemvulnerabilitya weakness that allowsa threat to be carriedout, such as a USBport that is enabled onthe server hosting thedatabase or a serverroom door that isfrequently left ajarconfidentialityensures thatdata is notdisclosed tounintendedpersonsthreatagentperson orentity thatattempts orcarries out athreatavailabilityensures theuptime of thesystem so thatdata isaccessiblewhen neededcybercriminalusually seek toexploit securityvulnerabilities forsome kind offinancial reward orrevengehactivistmisuse a computersystem or networkfor socially orpolitically motivatedreasonsdefenseindeptha security approachthat combinesmultiple securitycontrols anddefenses to create acumulative effectIPAddressa series ofnumbers thatidentifies anydevice on anetworkPrincipleof LeastPrivilegeusers andprograms shouldonly have thenecessary accessto complete theirtasksthink likeanadversarystrategy thatallows you toanticipate attackstrategies anddefend yoursystemsaccordinglyintegrityensures thatdata is notmodified ortamperedwithnon-repudiationprovidesvalidation ofa message'soriginexploita procedure orproduct that takesadvantage of avulnerability tocarry out a threatassetsomethingthat hasvalue to theperson ororganizationscriptkiddieunsophisticatedthreat actorsthat find andrun attacks theyfind online zerodayattack targeting asoftwarevulnerability whichis unknown to thesoftware vendor orto antivirus vendorsthreatanything thathas thepotential tocause the lossof an assetpenetrationtestingattempt toevaluate thesecurity of an ITinfrastructure bysafely trying toexploitvulnerabilitiesMACAddressa hardwareidentificationnumber thatuniquely identifieseach device on anetworknation-stateextremelysophisticatedhacker that issponsored by oraffiliated with agovernmentalorganizationIoTnetwork ofphysical objectsembedded withsensors andsoftwareconnected to theInternetLinuxopen source andcommunity-developed operatingsystem forcomputers, servers,mainframes, mobiledevices andembedded devicesreconnaissancepractice ofcovertlydiscovering andcollectinginformationabout a systemenumerationprocess ofextracting usernames, machinenames, networkresources, sharesand services from asystemvulnerabilitya weakness that allowsa threat to be carriedout, such as a USBport that is enabled onthe server hosting thedatabase or a serverroom door that isfrequently left ajarconfidentialityensures thatdata is notdisclosed tounintendedpersonsthreatagentperson orentity thatattempts orcarries out athreatavailabilityensures theuptime of thesystem so thatdata isaccessiblewhen neededcybercriminalusually seek toexploit securityvulnerabilities forsome kind offinancial reward orrevengehactivistmisuse a computersystem or networkfor socially orpolitically motivatedreasonsdefenseindeptha security approachthat combinesmultiple securitycontrols anddefenses to create acumulative effect

Cybersecurity Overview - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. a series of numbers that identifies any device on a network
    IP Address
  2. users and programs should only have the necessary access to complete their tasks
    Principle of Least Privilege
  3. strategy that allows you to anticipate attack strategies and defend your systems accordingly
    think like an adversary
  4. ensures that data is not modified or tampered with
    integrity
  5. provides validation of a message's origin
    non-repudiation
  6. a procedure or product that takes advantage of a vulnerability to carry out a threat
    exploit
  7. something that has value to the person or organization
    asset
  8. unsophisticated threat actors that find and run attacks they find online
    script kiddie
  9. attack targeting a software vulnerability which is unknown to the software vendor or to antivirus vendors
    zero day
  10. anything that has the potential to cause the loss of an asset
    threat
  11. attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities
    penetration testing
  12. a hardware identification number that uniquely identifies each device on a network
    MAC Address
  13. extremely sophisticated hacker that is sponsored by or affiliated with a governmental organization
    nation-state
  14. network of physical objects embedded with sensors and software connected to the Internet
    IoT
  15. open source and community-developed operating system for computers, servers, mainframes, mobile devices and embedded devices
    Linux
  16. practice of covertly discovering and collecting information about a system
    reconnaissance
  17. process of extracting user names, machine names, network resources, shares and services from a system
    enumeration
  18. a weakness that allows a threat to be carried out, such as a USB port that is enabled on the server hosting the database or a server room door that is frequently left ajar
    vulnerability
  19. ensures that data is not disclosed to unintended persons
    confidentiality
  20. person or entity that attempts or carries out a threat
    threat agent
  21. ensures the uptime of the system so that data is accessible when needed
    availability
  22. usually seek to exploit security vulnerabilities for some kind of financial reward or revenge
    cyber criminal
  23. misuse a computer system or network for socially or politically motivated reasons
    hactivist
  24. a security approach that combines multiple security controls and defenses to create a cumulative effect
    defense in depth